0 0
Read Time:1 Minute, 30 Second
Hi, today WE CHANGED OLD DOMAIN TO ONION ONLY https://cpanel.pua75npooc4ekrkkppdglaleftn5mi2hxsunz5uuup6uxqmen4deepyd.onion
because there is to many abuse reports on our domains (evilproxy.pro, top-cyber.club).
CPANEL WORKS FROM NOW ONLY IN TOR AND WILL NEVER WORK ON MAIN WEB, USE TOR BROWSER OR BRAVE TOR TAB TO ACCESS PANEL.

PhaaS is also known as Moloch and has some connection to a phishing kit developed by several well-known underground actors who have previously targeted financial institutions and the e-commerce sector.

EvilProxy is part of a new wave of phishing services that use the AitM reverse proxy model and cookie injection capabilities to bypass MFA protection.

If earlier Reverse Proxy and Cookie Injection were seen in targeted APT campaigns, now they are successfully implemented on the mass market as part of EvilProxy, which allows attackers to attack targets on the most serious scale without having to hack higher services.

Hi, We offer Phishing as Service with 1 day DEMO inside onion network

IF YOU want request DEMO send LINK on your profile (from exploit.in, xss.is, breached.to) here ! and will send login details from demo to this nickname. PRICES:20/31 days = 250/400$ Use only official contacts all other is scammers.

Through investigations into attacks against several employees of Fortune 500 companies, Resecurity was able to obtain detailed information about EvilProxy, including the structure, modules, functions, and network infrastructure used to carry out malicious activity.

The victims of the first attacks at that time were clients of Google and MSFT.

EvilProxy was first announced in early May 2022, its creators released a demo video.

It details the possibilities for delivering advanced phishing links to hijack user accounts of Apple, Facebook, GoDaddy, GitHub, Google, Dropbox, Instagram, Microsoft, Twitter, Yahoo, Yandex and others.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence